{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:09Z","timestamp":1740122529699,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,10,27]],"date-time":"2018-10-27T00:00:00Z","timestamp":1540598400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572189"],"award-info":[{"award-number":["61572189"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10623-018-0574-2","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T21:59:15Z","timestamp":1540591155000},"page":"1749-1763","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3474-4115","authenticated-orcid":false,"given":"Qichun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"issue":"1","key":"574_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TIT.1972.1054732","volume":"18","author":"ER Berlekamp","year":"1972","unstructured":"Berlekamp E.R., Welch L.R.: Weight distributions of the cosets of the (32, 6) Reed-Muller code. IEEE Trans. Inf. Theory 18(1), 203\u2013207 (1972).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"574_CR2","unstructured":"Braeken A., Preneel B.: On the algebraic immunity of symmetric Boolean functions. In: Progress in Cryptology-Indocrypt 2005, LNCS 3797, pp. 35\u201348. Springer, New York (2005)."},{"key":"574_CR3","unstructured":"Carlet C.: The complexity of Boolean functions from cryptographic viewpoint (2006). \n                    http:\/\/dblp.uni-trier.de\/db\/conf\/dagstuhl\/P6111.html\n                    \n                  ."},{"key":"574_CR4","doi-asserted-by":"crossref","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting codes, chapter of the monography. In: Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257\u2013397. Cambridge University Press, Cambridge (2010). \n                    http:\/\/www-roc.inria.fr\/secret\/Claude.Carlet\/pubs.html\n                    \n                  .","DOI":"10.1017\/CBO9780511780448.011"},{"issue":"7","key":"574_CR5","doi-asserted-by":"publisher","first-page":"4852","DOI":"10.1109\/TIT.2011.2146170","volume":"57","author":"C Carlet","year":"2011","unstructured":"Carlet C.: Comments on constructions of cryptographically significant boolean functions using primitive polynomials. IEEE Trans. Inf. Theory 57(7), 4852\u20134853 (2011).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"574_CR6","unstructured":"Carlet C., Feng K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Advances in Cryptology\u2014ASIACRYPT 2008, LNCS 5350, pp. 425\u2013440. Springer, New York (2008)."},{"issue":"1","key":"574_CR7","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/TIT.2006.887494","volume":"53","author":"C Carlet","year":"2007","unstructured":"Carlet C., Mesnager S.: Improving the upper bounds on the covering radii of binary Reed-Muller codes. IEEE Trans. Inf. Theory 53(1), 162\u2013173 (2007).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"574_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10623-015-0145-8","volume":"78","author":"C Carlet","year":"2016","unstructured":"Carlet C., Mesnager S.: Four decades of research on bent functions. Des. Codes Cryptogr. 78(1), 5\u201350 (2016).","journal-title":"Des. Codes Cryptogr."},{"issue":"7","key":"574_CR9","doi-asserted-by":"publisher","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","volume":"52","author":"C Carlet","year":"2006","unstructured":"Carlet C., Dalai D.K., Gupta K.C., Maitra S.: Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans. Inf. Theory 52(7), 3105\u20133121 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"574_CR10","volume-title":"Covering Codes","author":"G Cohen","year":"1997","unstructured":"Cohen G., Honkala I., Litsyn S., Lobstein A.: Covering Codes. North-Holland, Amsterdam (1997)."},{"key":"574_CR11","volume-title":"Cryptographic Boolean Functions and Applications","author":"TW Cusick","year":"2017","unstructured":"Cusick T.W., St\u0103nic\u0103 P.: Cryptographic Boolean Functions and Applications, 2nd edn. Elsevier, New York (2017).","edition":"2"},{"key":"574_CR12","doi-asserted-by":"crossref","unstructured":"Dalai D.K., Maitra K.C., Maitra S.: Cryptographically significant Boolean functions: construction and analysis in terms of algebraic immunity. In: Proceedings of FSE 2005, LNCS 3557, pp. 98\u2013111. Springer, New York (2005)","DOI":"10.1007\/11502760_7"},{"issue":"1","key":"574_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","volume":"40","author":"DK Dalai","year":"2006","unstructured":"Dalai D.K., Maitra S., Sarkar S.: Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Des. Codes Cryptogr. 40(1), 41\u201358 (2006).","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"574_CR14","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10623-008-9228-0","volume":"50","author":"K Feng","year":"2009","unstructured":"Feng K., Liao Q., Yang J.: Maximum values of generalized algebraic immunity. Des. Codes Cryptogr. 50(2), 243\u2013252 (2009).","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"574_CR15","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1007\/s10623-017-0383-z","volume":"86","author":"S Gangopadhyay","year":"2018","unstructured":"Gangopadhyay S., Mandal B., St\u0103nic\u0103 P.: Gowers \n                    \n                      \n                    \n                    $$U_3$$\n                    \n                      \n                        \n                          U\n                          3\n                        \n                      \n                    \n                   norm of some classes of bent Boolean functions. Des. Codes Cryptogr. 86(5), 1131\u20131148 (2018).","journal-title":"Des. Codes Cryptogr."},{"key":"574_CR16","unstructured":"Goli\u0107 J.D.: Linear cryptanalysis of stream ciphers. In: Fast Software Encryption\u2014FSE 1994, LNCS 1008, pp. 154\u2013169. Springer, New York (1994)."},{"key":"574_CR17","unstructured":"Hakala R.M., Nyberg K.: On the nonlinearity of the discrete logarithm in \n                    \n                      \n                    \n                    $$\\mathbb{F}_2^n$$\n                    \n                      \n                        \n                          F\n                          2\n                          n\n                        \n                      \n                    \n                  . In: SEquences and Their Applications\u2013SETA 2010, LNCS 6338, pp. 333\u2013345. Springer, New York (2010)."},{"issue":"2","key":"574_CR18","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1006\/jcta.1996.0055","volume":"74","author":"XD Hou","year":"1996","unstructured":"Hou X.D.: Covering radius of the Reed-Muller code \n                    \n                      \n                    \n                    $$R(1, 7)$$\n                    \n                      \n                        \n                          R\n                          (\n                          1\n                          ,\n                          7\n                          )\n                        \n                      \n                    \n                  \u2014a simpler proof. J. Comb. Theory Ser. A 74(2), 337\u2013341 (1996).","journal-title":"J. Comb. Theory Ser. A"},{"issue":"3","key":"574_CR19","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/18.490572","volume":"42","author":"XD Hou","year":"1996","unstructured":"Hou X.D.: On the covering radius of \n                    \n                      \n                    \n                    $$R(1, m)$$\n                    \n                      \n                        \n                          R\n                          (\n                          1\n                          ,\n                          m\n                          )\n                        \n                      \n                    \n                   in \n                    \n                      \n                    \n                    $$R(3, m)$$\n                    \n                      \n                        \n                          R\n                          (\n                          3\n                          ,\n                          m\n                          )\n                        \n                      \n                    \n                  . IEEE Trans. Inf. Theory 42(3), 1035\u20131037 (1996).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"574_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1023\/A:1027399606196","volume":"8","author":"XD Hou","year":"1996","unstructured":"Hou X.D.: The Covering Radius of \n                    \n                      \n                    \n                    $$R(1, 9)$$\n                    \n                      \n                        \n                          R\n                          (\n                          1\n                          ,\n                          9\n                          )\n                        \n                      \n                    \n                   in \n                    \n                      \n                    \n                    $$R(4, 9)$$\n                    \n                      \n                        \n                          R\n                          (\n                          4\n                          ,\n                          9\n                          )\n                        \n                      \n                    \n                  . Des. Codes Cryptogr. 8(3), 285\u2013292 (1996).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"574_CR21","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/18.568715","volume":"43","author":"XD Hou","year":"1997","unstructured":"Hou X.D.: On the norm and covering radius of the first order Reed-Muller codes. IEEE Trans. Inf. Theory 43(3), 1025\u20131027 (1997).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"574_CR22","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.ic.2009.12.002","volume":"208","author":"S Kavut","year":"2010","unstructured":"Kavut S., Y\u00fccel M.D.: 9-variable Boolean functions with nonlinearity 242 in the generalized rotation symmetric class. Inf. Comput. 208(4), 341\u2013350 (2010).","journal-title":"Inf. Comput."},{"issue":"5","key":"574_CR23","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/TIT.2007.894696","volume":"53","author":"S Kavut","year":"2007","unstructured":"Kavut S., Maitra S., Y\u00fccel M.D.: Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory 53(5), 1743\u20131751 (2007).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"574_CR24","unstructured":"Li N., Qi W.F.: Construction and analysis of Boolean functions of \n                    \n                      \n                    \n                    $$2t+1$$\n                    \n                      \n                        \n                          2\n                          t\n                          +\n                          1\n                        \n                      \n                    \n                   variables with maximum algebraic immunity. In: Advances in Cryptology\u2013ASIACRYPT 2006, LNCS 4284, pp. 84\u201398. Springer, New York (2006)."},{"issue":"3","key":"574_CR25","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TIT.2007.915914","volume":"54","author":"N Li","year":"2008","unstructured":"Li N., Qu L., Qi W., Feng G., Li C., Xie D.: On the construction of Boolean functions with optimal algebraic immunity. IEEE Trans. Inf. Theory 54(3), 1330\u20131334 (2008).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"574_CR26","volume-title":"Introduction to Finite Fields and Their Applications","author":"R Lidl","year":"1986","unstructured":"Lidl R., Niederreiter H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1986)."},{"key":"574_CR27","unstructured":"Liu M., Zhang Y., Lin D.: Perfect algebraic immune functions. Advances in Cryptology\u2013ASIACRYPT 2012, LNCS 7658, pp. 172\u2013189. Springer, New York (2012)."},{"key":"574_CR28","unstructured":"Meier W., Staffelbach O.: Fast correlation attacks on stream ciphers. In: Advances in Cryptology\u2013EUROCRYPT \u201988, LNCS 330, pp. 301\u2013314. Springer, New York (1988)."},{"issue":"3","key":"574_CR29","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TIT.1980.1056187","volume":"26","author":"JJ Mykkeltveit","year":"1980","unstructured":"Mykkeltveit J.J.: The covering radius of the (128, 8) Reed-Muller code is 56. IEEE Trans. Inf. Theory 26(3), 359\u2013362 (1980).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"574_CR30","unstructured":"Pasalic, E.: Almost fully optimized infinite classes of Boolean functions resistant to (Fast) algebraic cryptanalysis. In: Proceedings of ICISC 2008, LNCS 5461, pp. 399\u2013414. Springer, New York (2009)."},{"issue":"3","key":"574_CR31","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TIT.1983.1056679","volume":"29","author":"NJ Patterson","year":"1983","unstructured":"Patterson N.J., Wiedemann D.H.: The covering radius of the (215, 16) Reed-Muller code is at least 16276. IEEE Trans. Inf. Theory 29(3), 354\u2013356 (1983).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"574_CR32","doi-asserted-by":"publisher","first-page":"2406","DOI":"10.1109\/TIT.2009.2015999","volume":"55","author":"L Qu","year":"2009","unstructured":"Qu L., Feng K., Liu F., Wang L.: Constructing symmetric Boolean functions with maximum algebraic immunity. IEEE Trans. Inf. Theory 55(5), 2406\u20132412 (2009).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"574_CR33","doi-asserted-by":"publisher","first-page":"4014","DOI":"10.1109\/TIT.2010.2050801","volume":"56","author":"P Rizomiliotis","year":"2010","unstructured":"Rizomiliotis P.: On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation. IEEE Trans. Inf. Theory 56(8), 4014\u20134024 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"574_CR34","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1587\/transfun.E94.A.165","volume":"94","author":"C Tan","year":"2011","unstructured":"Tan C., Goh S.: Several classes of even-variable balanced Boolean functions with optimal algebraic immunity. Trans. Fundam. Electron. Commun. Comput. Sci. 94(1), 165\u2013171 (2011).","journal-title":"Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"574_CR35","unstructured":"Tang D., Maitra S.: Construction of \n                    \n                      \n                    \n                    $$n$$\n                    \n                      \n                        n\n                      \n                    \n                  -variable \n                    \n                      \n                    \n                    $$(n \\equiv 2 \\text{mod}4)$$\n                    \n                      \n                        \n                          (\n                          n\n                          \u2261\n                          2\n                          mod\n                          4\n                          )\n                        \n                      \n                    \n                   balanced Boolean functions with maximum absolute value in autocorrelation spectra \n                    \n                      \n                    \n                    $$< 2^{n\/2}$$\n                    \n                      \n                        \n                          <\n                          \n                            2\n                            \n                              n\n                              \/\n                              2\n                            \n                          \n                        \n                      \n                    \n                  . IEEE Trans. Inf. Theory 64(1), 393\u2013402 (2018)."},{"issue":"1","key":"574_CR36","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TIT.2012.2217476","volume":"59","author":"D Tang","year":"2013","unstructured":"Tang D., Carlet C., Tang X.: Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Trans. Inf. Theory 59(1), 653\u2013664 (2013).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"574_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-010-9413-9","volume":"60","author":"Z Tu","year":"2011","unstructured":"Tu Z., Deng Y.: A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity. Des. Codes Cryptogr. 60(1), 1\u201314 (2011).","journal-title":"Des. Codes Cryptogr."},{"key":"574_CR38","doi-asserted-by":"crossref","unstructured":"Wang Q., St\u0103nic\u0103 P.: New bounds on the covering radius of the second order Reed\u2013Muller code of length 128. Cryptogr. Commun. (2018). \n                    https:\/\/doi.org\/10.1007\/s12095-018-0289-2\n                    \n                  .","DOI":"10.1007\/s12095-018-0289-2"},{"key":"574_CR39","unstructured":"Wang Q., Tan C.H.: Properties of a family of cryptographic Boolean functions. In: SEquences and Their Applications\u2013SETA 2014, LNCS 8865, pp. 34\u201346. Springer, New York (2012)."},{"key":"574_CR40","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.dam.2016.04.004","volume":"211","author":"Q Wang","year":"2016","unstructured":"Wang Q., Tan C.H.: Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences. Discret. Appl. Math. 211, 217\u2013221 (2016).","journal-title":"Discret. Appl. Math."},{"issue":"6","key":"574_CR41","doi-asserted-by":"publisher","first-page":"3048","DOI":"10.1109\/TIT.2010.2046195","volume":"56","author":"Q Wang","year":"2010","unstructured":"Wang Q., Peng J., Kan H., Xue X.: Constructions of cryptographically significant Boolean functions using primitive polynomials. IEEE Trans. Inf. Theory 56(6), 3048\u20133053 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"574_CR42","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10623-017-0329-5","volume":"86","author":"Q Wang","year":"2018","unstructured":"Wang Q., Tan C.H., Prabowo T.F.: On the covering radius of the third order Reed-Muller code \n                    \n                      \n                    \n                    $$RM(3, 7)$$\n                    \n                      \n                        \n                          R\n                          M\n                          (\n                          3\n                          ,\n                          7\n                          )\n                        \n                      \n                    \n                  . Des. Codes Cryptogr. 86(1), 151\u2013159 (2018).","journal-title":"Des. Codes Cryptogr."},{"issue":"9","key":"574_CR43","doi-asserted-by":"publisher","first-page":"6310","DOI":"10.1109\/TIT.2011.2109935","volume":"57","author":"X Zeng","year":"2011","unstructured":"Zeng X., Carlet C., Shan J., Hu L.: More balanced Boolean functions with optimal algebraic immunity, and good nonlinearity and resistance to fast algebraic attacks. IEEE Trans. Inf. Theory 57(9), 6310\u20136320 (2011).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0574-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0574-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0574-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T08:26:14Z","timestamp":1579163174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0574-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,27]]},"references-count":43,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["574"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0574-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2018,10,27]]},"assertion":[{"value":"28 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}